| From text to mitre techniques: Exploring the malicious use of large language models for generating cyber attack payloads PV Charan, H Chunduri, PM Anand, SK Shukla arXiv preprint arXiv:2305.15336, 2023 | 87 | 2023 |
| Advance persistent threat detection using long short term memory (LSTM) neural networks PV Sai Charan, T Gireesh Kumar, P Mohan Anand International Conference on Emerging Technologies in Computer Engineering, 45-54, 2019 | 34 | 2019 |
| An ensemble approach for algorithmically generated domain name detection using statistical and lexical analysis PM Anand, TG Kumar, PVS Charan Procedia Computer Science 171, 1129-1136, 2020 | 31 | 2020 |
| Hiper-early detection of a ransomware attack using hardware performance counters PM Anand, PVS Charan, SK Shukla Digital Threats: Research and Practice 4 (3), 1-24, 2023 | 29 | 2023 |
| A comprehensive API call analysis for detecting Windows-based ransomware PM Anand, PVS Charan, SK Shukla 2022 IEEE International Conference on Cyber Security and Resilience (CSR …, 2022 | 28 | 2022 |
| Early detection of ransomware activity based on hardware performance counters MA Putrevu, VSC Putrevu, SK Shukla Proceedings of the 2023 Australasian Computer Science Week, 10-17, 2023 | 20 | 2023 |
| Detecting word based dga domains using ensemble models PVS Charan, SK Shukla, PM Anand International Conference on Cryptology and Network Security, 127-143, 2020 | 17 | 2020 |
| Dmapt: Study of data mining and machine learning techniques in advanced persistent threat attribution and detection PVS Charan, PM Anand, SK Shukla Data Mining-Concepts and Applications, 2021 | 15 | 2021 |
| DOTMUG: a threat model for target specific APT attacks–misusing google teachable machine PVS Charan, PM Anand, SK Shukla, N Selvan, H Chunduri 2022 10th International Symposium on Digital Forensics and Security (ISDFS), 1-8, 2022 | 13 | 2022 |
| A framework for advanced persistent threat attribution using zachman ontology VSC Putrevu, H Chunduri, MA Putrevu, S Shukla Proceedings of the 2023 European Interdisciplinary Cybersecurity Conference …, 2023 | 11 | 2023 |
| Adapt: Adaptive camouflage based deception orchestration for trapping advanced persistent threats VSC Putrevu, S Mukhopadhyay, S Manna, N Rani, A Vaid, H Chunduri, ... Digital Threats: Research and Practice 5 (3), 1-35, 2024 | 8 | 2024 |
| Rtr-shield: Early detection of ransomware using registry and trap files PM Anand, PVS Charan, H Chunduri, SK Shukla International Conference on Information Security Practice and Experience …, 2023 | 7 | 2023 |
| From Text to MITRE Techniques: Exploring the Malicious Use of Large Language Models for Generating Cyber Attack Payloads. arXiv 2023 PVS Charan, H Chunduri, PM Anand, SK Shukla arXiv preprint arXiv:2305.15336, 0 | 7 | |
| DKaaS: DARK-KERNEL as a service for active cyber threat intelligence PVS Charan, G Ratnakaram, H Chunduri, PM Anand, SK Shukla Computers & Security 132, 103329, 2023 | 5 | 2023 |
| A novel approach for insight finding mechanism on clickstream data using hadoop PM Anand, GS Vamsi, PR Kumar 2018 Second International Conference on Inventive Communication and …, 2018 | 5 | 2018 |
| A comprehensive analysis of machine learning based file trap selection methods to detect crypto ransomware MA Putrevu, H Chunduri, VSC Putrevu, SK Shukla arXiv preprint arXiv:2409.11428, 2024 | 3 | 2024 |
| LARM: Linux Anti Ransomware Monitor PM Anand, PVS Charan, H Chunduri, SK Shukla Computers & Security, 104700, 2025 | 1 | 2025 |
| Trusted Yet Disguised: Analysing the Subversive Role of LOLBins in Contemporary Cyber Threats H Chunduri, PM Anand, SK Shukla, PVS Charan 2024 IEEE International Conference on Big Data (BigData), 2596-2605, 2024 | 1 | 2024 |
| Slap-iot: A secure lightweight authentication protocol for iot device CHNS Abhishek, C Srinivasan, L KV, PM Anand inventive communication and computational technologies: Proceedings of …, 2022 | 1 | 2022 |
| Addressing cold start problem in recommendation system using custom built hadoop ecosystem PVS Charan, PR Kumar, PM Anand 2018 Second International Conference on Inventive Communication and …, 2018 | 1 | 2018 |